US10740298B2 - File synchronization with reduced conflicts in computing systems - Google Patents

File synchronization with reduced conflicts in computing systems Download PDF

Info

Publication number
US10740298B2
US10740298B2 US15/405,553 US201715405553A US10740298B2 US 10740298 B2 US10740298 B2 US 10740298B2 US 201715405553 A US201715405553 A US 201715405553A US 10740298 B2 US10740298 B2 US 10740298B2
Authority
US
United States
Prior art keywords
server
copy
local
token
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US15/405,553
Other versions
US20180101544A1 (en
Inventor
Andrew Sean Watson
Steve Rayson
Yigithan Dedeoglu
George Armah
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Priority to US15/405,553 priority Critical patent/US10740298B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ARMAH, GEORGE, WATSON, ANDREW SEAN, DEDEOGLU, YIGITHAN, RAYSON, STEVE
Priority to CN201780062898.7A priority patent/CN109804361B/en
Priority to EP17784819.9A priority patent/EP3526691B1/en
Priority to PCT/US2017/055452 priority patent/WO2018071276A1/en
Publication of US20180101544A1 publication Critical patent/US20180101544A1/en
Application granted granted Critical
Publication of US10740298B2 publication Critical patent/US10740298B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/178Techniques for file synchronisation in file systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Definitions

  • file servers are computers configured to provide shared storage of documents, sound files, photographs, movies, images, databases, or other suitable types of computer files over computer networks.
  • File servers can facilitate multiple client devices to access the same computer files stored in an on-premises or remote repository. Users utilizing suitable client devices can retrieve, edit, save, or perform other suitable file operations on computer files while file servers track versions of the computer files, last edited date/time, users who edited and/or accessed the computer files, and/or other suitable information.
  • File synchronization is a process of ensuring that computer files in two or more file locations are updated according to certain rules.
  • updated files are copied from a source location (e.g., a hard drive) to one or more target locations (e.g., a cloud storage location). However, no files are copied back from the target locations to the source location.
  • target locations e.g., a cloud storage location.
  • updated files are copied in both directions, usually with the purpose of maintaining identical copies at the all locations.
  • file synchronization refers to two-way file synchronization.
  • a synchronization conflict exists when two copies of a single computer file contain different changes based on the same or different versions of the computer file.
  • a user can upload a computer file from a client device to a file server.
  • the file server can store a server copy of the uploaded computer file on the file server or in a suitable storage location.
  • the file server or other servers can insert various metadata (e.g., time of creation, uploaded by, priority, etc.) into the server copy based on certain metadata schema.
  • the server copy can become “updated” and byte-wise different than a local copy of the computer file on the client device.
  • the edited local copy would contain changes different than those (i.e., the inserted metadata) in the server copy.
  • a synchronization conflict would be triggered during file synchronization between the local and server copies of the computer file. Resolving such conflicts can be time consuming, costly, and can negatively impact user experience.
  • the read validation token can be updated when a copy of a computer file is modified in any way to be byte-wise different than an original copy.
  • the “updated” server copy can be associated with a new read validation token.
  • the write validation token is updated only when a copy of a computer file contains changes that are to be preserved. Such changes can include, for example, user edits or other changes a user performs on a computer file.
  • the write validation token is maintained even when the copy is byte-wise modified.
  • metadata insertions can be machine modifications that are re-appliable and thus do not cause a write validation token to be updated.
  • a file server can assign a read validation token and a write validation token to an uploaded computer file and notify the client device regarding the assigned read/write validation tokens.
  • at least one of the read or write validation token can be generated and/or predicted based on a protocol followed by both a file server and client devices.
  • the read or write validation token can include a hash (e.g., an XOR hash) of the computer file.
  • the read or write validation token can be generated utilizing discrete numbers, random numbers, or in other suitable fashions.
  • the client device can determine that the server copy has been updated and download the server copy to overwrite the local copy. For example, during creation of the server copy and/or file maintenance, insertion of metadata can cause the server copy to have a read validation token different than that of the local copy because the server copy with the inserted metadata is byte-wise different than the local copy. As such, once the client device detects such a difference during file synchronization, the client device can download the server copy to overwrite the local copy on the client device, and thus achieving overall synchronization of the computer file.
  • the client device can upload the modified local copy to overwrite the server copy even when a read validation token of the local copy is different than that of the server copy.
  • a read validation token of the local copy is different than that of the server copy.
  • insertion of the metadata into the server copy can cause the server copy to have an updated read validation token different than that of the local copy.
  • the inserted metadata can be indicated as re-appliable machine modifications (e.g., by a workflow server) and thus does not cause the write validation token associated with the server copy to change.
  • the edited local copy and the server copy can still have the same write validation token.
  • the client device can upload the edited local copy as a new server copy to overwrite the existing server copy with the previously inserted metadata. Subsequently, the metadata can be reapplied to the new server copy, and the client device can download the new server copy with the inserted metadata based on a difference of read validation token between the new server copy and the local copy to achieve synchronization of the computer file, as described above.
  • Several embodiments of the disclosed technology can limit occurrences of synchronization conflicts due to re-appliable machine modifications to computer files by file servers, workflow servers, or other suitable computing devices. Instead of indicating a synchronization conflict exists between a user-edited local copy and a server copy with machine modifications, several embodiments of the disclosed technology allow the server copy be overwritten by the user-edited local copy along with the machine modifications. The same or similar machine modifications can later be re-applied to the overwritten server copy. The client device can then download the overwritten server copy with the re-applied machine modifications when no more user edits exist in the local copy to achieve overall synchronization of the computer file.
  • FIG. 1 is a schematic diagram of a computer system implementing both read and write validation tokens in accordance with embodiments of the disclosed technology.
  • FIGS. 2A-2D are schematic diagrams illustrating certain hardware/software components of the computing system in FIG. 1 during certain stages of a file synchronization process.
  • FIGS. 3A-3D are schematic diagrams illustrating certain hardware/software components of the computing system in FIG. 1 during certain stages of another file synchronization process.
  • FIGS. 4A-4C are flowcharts illustrating various aspects of processes of file synchronization in accordance with embodiments of the disclosed technology.
  • FIG. 5 is a computing device suitable for certain components of the computing system in FIG. 1 .
  • file synchronization generally refers to a process of ensuring that copies of computer files in two or more file locations are updated in both directions according to certain rules.
  • a new or updated copy of a computer file can be copied (e.g., uploaded) from a client device to a file server via a computer network, a direct wired/wireless connection, or other suitable communications channels.
  • an updated copy of the same computer file can be copied (e.g., downloaded) from the file server to the client device via a suitable communications channel.
  • a “synchronization conflict” can occur when copies of the same computer file include different changes based on the same or different versions of the computer file.
  • file servers or other types of servers can insert, add, append, or otherwise modify a user-uploaded computer file.
  • a client device can include a copy of a computer file (referred to as “local copy) to be uploaded to a file server.
  • the file server can store the received copy of the computer file (referred to “server copy”) in a network storage location, a server hard drive, or other suitable storage locations.
  • server copy various metadata (e.g., time of creation, uploaded by, priority, etc.) can be inserted into the server copy based on metadata schema of the file sharing system.
  • the server copy can become “updated,” i.e., containing new digital data, then the local copy on the client device. If the local copy is edited on the client device without downloading the “updated” server copy, the edited local copy can contain changes different than those (i.e., the inserted metadata) in the “updated” server copy, and thus causing a synchronization conflict. Resolving such conflicts can be time consuming, costly, and can negatively impact user experience.
  • the read validation token can be updated when a server copy of a computer file is modified in any way to be byte-wise different than an original server copy.
  • the write validation token can be maintained when a server copy of a computer file is modified but the modification is indicated as re-appliable. For example, the insertion of metadata or other suitable types of machine modifications can be indicated as re-appliable and thus do not cause a write validation token to be updated.
  • the disclosed technology allows the file server to overwrite the server copy with the machine modifications with the user-edited local copy.
  • certain synchronization conflicts due to re-appliable machine modifications can be avoided, as described in more detail below with reference to FIGS. 1-5 .
  • FIG. 1 is a schematic diagram illustrating a file sharing computer system 100 implementing both read and write validation tokens in accordance with embodiments of the disclosed technology.
  • the computer system 100 can include a file server 106 and a workflow server 126 interconnected with one or more client devices 102 via a computer network 104 .
  • the individual client devices 102 are associated with corresponding users 101 .
  • the computer network 104 can include an enterprise intranet, a wide area network, a local area network, the Internet, or other suitable types of network.
  • the computer system 100 can include additional and/or different components.
  • the computer system 100 includes three client devices 102 corresponding to different users 101 .
  • the computer system 100 can also include multiple client devices 102 associated with a single user 101 .
  • the computer system 100 can also include additional file servers, web servers, domain name servers, workflow servers, network storage facilities, or other suitable components.
  • the client devices 102 can each include a computing device that facilitates corresponding users 101 to access to the file server 106 via the computer network 104 .
  • the client devices 102 individually include a desktop computer.
  • the client devices 102 can also include laptop computers, tablet computers, smartphones, or other suitable computing devices.
  • the computer system 100 can facilitate any suitable number of users 101 to access file server 106 via the computer network 104 .
  • the file server 106 can be configured to provide shared storage of documents, sound files, photographs, movies, images, databases, or other suitable types of computer files to the client devices 102 over the computer network 104 .
  • users 101 utilizing corresponding client devices 102 can retrieve, edit, save, or perform other suitable file operations on computer files managed by the file server 106 .
  • the file server 106 in turn can track versions of computer files, last edited date/time, users who edited and/or accessed the computer files, and/or other suitable information associated with the computer files.
  • the file server 106 can include one or more servers having suitable software applications to provide file synchronization for users of an enterprise, company, corporations, government entities, or other suitable organizations.
  • the file server 106 can also include one or more remote servers providing cloud-based storage services such as, for example, Google Drive®, Dropbox®, iCloud Backup®, etc.
  • the file server 106 can be configured to implement both a read validation token and a write validation token associated with copies of computer files on the file server 106 in order to limit occurrences of synchronization conflicts due to machine modifications.
  • a read validation token can indicate to a client device 102 that a server copy of a computer file has been updated on the file server 106 .
  • a write validation token can indicate to a client device 102 that the server copy has not been updated with data (e.g., machine modifications) that cannot be re-applied.
  • a read/write validation token can include an XOR hash value of a copy of a computer file.
  • a read/write validation token can include numerical values, alphanumerical values, other types of hash values, or other suitable types of values.
  • Example components and operations of the file server 106 and one of the client devices 102 are described in more detail below with reference to FIGS. 2A-2D .
  • the workflow server 126 can be configured to apply machine modifications to copies of computer files managed by the file server 106 .
  • the workflow server 126 can include a server configured to facilitate processing and/or management of the computer files by, for example, supplementing metadata according to certain metadata schema.
  • the workflow server 126 can be configured to perform other suitable operations related to storage, retrieval, and/or maintenance of the computer files.
  • the workflow server 126 is shown in FIG. 1 as a component of the computer system 100 , in other embodiments, the workflow server 126 can be external to the computer network 100 . In further embodiments, the workflow server 126 can be omitted and associated operations performed by the file server 106 .
  • FIGS. 2A-2D are schematic diagrams illustrating certain hardware/software components of the computer system 100 in FIG. 1 during certain stages of a file synchronization process.
  • certain components of the computer system 100 are omitted for clarity.
  • client device 102 is shown in FIGS. 2 A- 2 D for illustration purposes.
  • Other client devices 102 can have similar components and associated operations, as those described in more detail below with reference to FIGS. 2A-2D .
  • individual software components, objects, classes, modules, and routines may be a computer program, procedure, or process written as source code in C, C++, C #, Java, and/or other suitable programming languages.
  • a component may include, without limitation, one or more modules, objects, classes, routines, properties, processes, threads, executables, libraries, or other components.
  • Components may be in source or binary form.
  • Components may include aspects of source code before compilation (e.g., classes, properties, procedures, routines), compiled binary units (e.g., libraries, executables), or artifacts instantiated and used at runtime (e.g., objects, processes, threads).
  • the various components and modules described below can be implemented with actors.
  • generation of the application and/or related services can also be implemented using monolithic applications, multi-tiered applications, or other suitable components.
  • Components within a system can take different forms within the system.
  • a system comprising a first component, a second component and a third component can, without limitation, encompass a system that has the first component being a property in source code, the second component being a binary compiled library, and the third component being a thread created at runtime.
  • the computer program, procedure, or process may be compiled into object, intermediate, or machine code and presented for execution by one or more processors of a personal computer, a network server, a laptop computer, a smartphone, and/or other suitable computing devices.
  • components may include hardware circuitry.
  • hardware may be considered fossilized software, and software may be considered liquefied hardware.
  • software instructions in a component may be burned to a Programmable Logic Array circuit, or may be designed as a hardware circuit with appropriate integrated circuits.
  • hardware may be emulated by software.
  • Various implementations of source, intermediate, and/or object code and associated data may be stored in a computer memory that includes read-only memory, random-access memory, magnetic disk storage media, optical storage media, flash memory devices, and/or other suitable computer readable storage media excluding propagated signals.
  • the client device 102 and the file server 106 can both include a processor operatively coupled to a memory containing instructions executable by the processor to provide certain software components.
  • the client device 102 can include a sync agent 108 interconnected to a sync folder 110 .
  • the sync agent 108 can be configured to perform synchronization state verification, file synchronization, file maintenance, or other suitable operations related to synchronization of computer files between the client device 102 and the file server 106 .
  • the sync folder 110 can be a file folder on the client device 102 designated to contain copies of computer files to be synchronized with corresponding copies on the file server 106 .
  • the sync folder 110 can be designated by default, for example, as related to a cloud-based storage. In other embodiments, the sync folder 110 can be manually designed by the user 101 , or designated in other suitable fashions.
  • the file server 120 can include an interface component 122 and a sync controller 124 operatively coupled to a repository 121 for storing computer files.
  • the interface component 122 can be configured to interact with the sync agent 108 on the client device 102 according to certain protocols.
  • the interface component 122 can include an application programming interface configured to receive certain input and in response provide certain output to the client device 102 .
  • the interface component 122 can also include a computer network interface or other suitable components.
  • the sync controller 124 can be configured to manage synchronization of copies of computer files in the repository 121 .
  • the sync controller 124 can be configured to implement a read validation token associated with each copy of the computer files.
  • the sync controller 124 can also be configured to implement a write validation token associated with each copy of the computer files to reduce certain synchronization conflicts between copies of computer files on the client device 102 and the repository 121 , as described in more detail below with reference to FIGS. 2A-3D .
  • a copy of a computer file in the sync folder 110 on the client device 102 is referred to as a “local copy” while a copy of the same computer file in the repository 121 is referred to as a “server copy.”
  • FIG. 2A illustrates a file synchronization stage in which the user 101 creates a local copy 112 a of a computer file 112 in the sync folder 110 via a file operation 103 .
  • the user 101 can drag and drop the computer file 112 from another file folder (not shown) on the client device 102 into the sync folder 110 .
  • the computer file 112 can be a newly created computer file.
  • the local copy 112 a can include a stream of digital data referenced as by a stream number one for illustration purposes.
  • the stream of digital data can be referenced using hash values, random numbers, or in other suitable ways.
  • the sync agent 108 can detect the presence of the local copy 112 a of the computer file 112 and determine that synchronization of the computer file 112 is needed based on, for example, metadata associated with the computer file 112 that indicates a lack of synchronization (e.g., having an empty last synchronized date/time) of the computer file 112 .
  • the sync agent 108 can be configured to transmit, via the computer network 104 ( FIG. 1 ), a sync request 130 a to the file server 106 .
  • the sync request 130 a can include data representing certain information associated with the computer file 112 . Such information can include, for example, file name, date/time created, authored by, file size, or other suitable information.
  • the interface component 122 can receive the sync request 130 a and provide the received sync request 130 a to the sync controller 124 for further processing.
  • the sync controller 124 can determine whether a corresponding server copy exists in the repository 121 .
  • a corresponding server copy does not exist in the repository 121 .
  • the file server 106 can provide a notification 131 a informing the client device 102 that a server copy does not exist on the file server 106 .
  • the notification 131 a can inform the client device 102 the existence of the server copy as well as associated read/write validation tokens associated with the server copy to the client device 102 .
  • the sync agent 108 can then determine whether to upload the local copy 112 a or download the server copy as described in more detail below with reference to FIGS. 2B-2C .
  • the client device 102 can upload the computer file 112 to the file server 106 via the computer network 104 .
  • the sync controller 124 can store a server copy 112 a ′ of the computer file 112 in the repository 121 .
  • the sync controller 124 can also be configured to associate the received computer file 112 and the server copy 112 a ′ with a read validation token (shown as “RVT”) and a write validation token (shown as “WVT”).
  • RVT read validation token
  • WVT write validation token
  • the sync controller 124 can provide the read/write tokens to the client device 102 as part of a sync report 132 a that indicates to the client device 102 that the upload has completed successfully and/or other suitable related information.
  • the client device 102 can predict the read/write validation tokens based on a protocol followed by both the client device 102 and the file server 106 . As shown in FIG. 2B , the read/write validation tokens for both the local copy 112 a and the server copy 112 a ′ of the computer file 112 are both assigned a value of one for illustration purposes. In other embodiments, the read/write validation tokens can have different hash values, random numbers, or other suitable values.
  • a workflow server 126 can be configured to apply machine modifications 128 to the server copy 112 a ′ ( FIG. 2B ).
  • the machine modifications 128 can include certain metadata supplemented to the server copy 112 a ′ to generate an updated server copy 112 b ′.
  • the machine modifications 128 can include other suitable machine applied changes to the server copy 112 a ′.
  • administrative servers, database servers, or other suitable types of servers can also apply machine modifications 128 to the server copy 112 a′.
  • the sync controller 124 can detect the application and, in response, update the read validation token. For example, as shown in FIG. 2C , the server copy 112 b ′ can now have a read validation token value of two and a stream value of two due to the machine modifications 128 .
  • the sync controller 124 can also be configured to receive, for example, from programs executing on the workflow server 126 , whether the applied machine modifications 128 are re-appliable. In certain embodiments, machine modifications 128 are re-appliable when such machine modifications 128 can be periodically applied if previous application is not detected. In other embodiments, machine modifications 128 are re-appliable when such machine modifications are repeatedly applied irrespective of previous applications.
  • the sync controller 124 can maintain the write validation token, for example, at one in FIG. 2C while updating the read validation token to two.
  • the client device 102 can transmit another sync request 130 b and in response receive another notification 131 b from the file server 106 , indicating that the server copy 112 b ′ is now associated with a read validation token of two while the write validation token stays at one.
  • the sync agent 108 can be configured to download the server copy 112 b ′ from the file server 106 and overwrite the local copy 112 a , as shown in FIG. 2D .
  • both the local copy 112 b and the server copy 112 b ′ have the same stream of digital data with the same read and write validation tokens.
  • the file synchronization operations shown in FIGS. 2C and 2D can sometimes be interrupted when the user 101 edits the local copy 112 a before the server copy 112 b ′ can be downloaded from the file server 106 .
  • the user 101 can perform another file operation 103 ′ to the local copy 112 a ( FIG. 2C ) to generate an updated local copy 112 c .
  • the local copy 112 c can now have a stream number three different than the original local copy 112 a.
  • the sync agent 108 in response to detecting the updated local copy 112 c , can transmit another sync request 130 c to the file server 106 and receive in response, another notification 131 c indicating that the server copy 112 b ′ is currently associated with a read validation token of two and a write validation token of one.
  • the sync agent 108 can determine that even though the server copy 112 b ′ contains changes only included in the local copy 112 c , such changes are deemed as re-appliable and thus can be overwritten because the write validation token associated with the local copy 112 c and that associated with the server copy 112 b ′ match.
  • the sync agent 108 can upload the local copy 112 c to the file server 106 to overwrite the server copy 112 b ′ along with the machine modifications 128 ( FIG. 2C ) previously applied.
  • the sync agent 108 can simply upload the edited local copy 112 c and the sync controller 124 can perform the foregoing operations to determine whether the server copy 112 b ′ may be overwritten.
  • the overwritten server copy 112 c ′ now has a read validation token of three and a write validation token of 2, matching those of the local copy 112 c , respectively.
  • the workflow server 126 can then re-apply the machine modifications 128 ′ to the server copy 112 c ′ to generate another updated server copy 112 d ′. Because the machine modifications 128 ′ are re-appliable, the sync controller 124 can update the associated read validation token to four while maintaining the write validation token at 2 . Subsequently, the client device 102 can download the server copy 112 d ′ from the file server 106 when the user 101 does not edit the local copy 112 c . As shown in FIG. 3D , the local copy 112 c ( FIG. 3C ) can then be overwritten with the server copy 112 d ′ to achieve synchronization between the local copy 112 d and the server copy 112 d′.
  • a read validation token can be updated when a server copy of a computer file is modified in any way to be byte-wise different than an original server copy.
  • the write validation token can be maintained when the server copy is modified but the machine modifications are indicated as re-appliable.
  • the disclosed technology allows the file server 106 to overwrite the server copy with the user-edited local copy.
  • certain synchronization conflicts due to re-appliable machine modifications can be avoided.
  • FIGS. 4A-4C are flowcharts illustrating processes of file synchronization in accordance with embodiments of the disclosed technology. Even though the processes are described below with reference to the computer system 100 of FIG. 1 , in other embodiments, the processes can also be applied in other computer systems with similar or different components.
  • FIG. 4A is a flowchart illustrating a process 200 of file synchronization when a local copy is modified in accordance with embodiments of the disclosed technology.
  • the process 200 can include detecting a change in a local copy of a computer file at stage 202 .
  • the detected change can include a user edit to the computer file.
  • the detected change can include a user creating the computer file.
  • the detected change can include other suitable user operations that create and/or modify the computer file.
  • the process 200 can then include obtaining state information of a corresponding server copy of the computer file at stage 204 .
  • the state information includes an existence or non-existence of a server copy of the computer file in, for example, the repository 121 of FIG. 2A .
  • the state information can also include a current read validation token and a current write validation token of a server copy in the repository 121 .
  • the state information can also include last modified by, last modification date/time, or other suitable information related to the server copy.
  • the process 200 can then include a decision stage 205 to determine whether the write validation token of the changed local copy matches that of the server copy. In response to determining that the write validation tokens match, the process 200 can include uploading the changed local copy to overwrite the server copy in the repository 121 , irrespective of whether the read validation tokens match, at stage 206 . In response to determining that the write validation tokens do not match, the process 200 can include indicating a synchronization conflict at stage 208 . The process 200 can also further include requesting user intervention for resolving the synchronization conflict and/or perform other suitable operations to resolve the synchronization conflict.
  • FIG. 4B is a flowchart illustrating a process 210 of file synchronization when a local copy is not modified in accordance with embodiments of the disclosed technology.
  • the process 210 can include obtaining state information of a corresponding server copy at stage 204 ′, generally similar to stage 204 described above with reference to FIG. 4A .
  • the process 210 can then include a decision stage 211 to determine whether a read validation token of the local copy matches that of the server copy.
  • the process 210 can include indicating that file synchronization of the computer file is complete at stage 214 .
  • the process 210 can include downloading the server copy to overwrite the local copy at stage 212 before indicating that file synchronization of the computer file is complete at stage 214 .
  • FIG. 4C is a flowchart illustrating a process 220 of managing a server copy on a file server in accordance with embodiments of the disclosed technology.
  • the process 220 can include receiving changes to a server copy at stage 222 .
  • the process 220 can then include a decision stage 224 to determine whether the received changes are re-appliable.
  • the changes are re-appliable when the changes are machine modifications that can be repeatedly applied.
  • the changes can be re-appliable based on other suitable criteria.
  • the process 220 can include updating a read validation token associated with the server copy without updating a write validation token associated with the same server copy.
  • the process 220 can include updating both the read validation token and the write validation token associated with the server copy.
  • FIG. 5 is a computing device 300 suitable for certain components of the computer system 100 in FIG. 1 .
  • the computing device 300 can be suitable for the file server 106 , the workflow server 126 , or the client devices 102 of FIG. 1 .
  • the computing device 300 can include one or more processors 304 and a system memory 306 .
  • a memory bus 308 can be used for communicating between processor 304 and system memory 306 .
  • the processor 304 can be of any type including but not limited to a microprocessor ( ⁇ P), a microcontroller ( ⁇ C), a digital signal processor (DSP), or any combination thereof.
  • the processor 304 can include one more levels of caching, such as a level-one cache 310 and a level-two cache 312 , a processor core 314 , and registers 316 .
  • An example processor core 314 can include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof.
  • An example memory controller 318 can also be used with processor 304 , or in some implementations, memory controller 318 can be an internal part of processor 304 .
  • system memory 306 can be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof.
  • the system memory 306 can include an operating system 320 , one or more applications 322 , and program data 324 . This described basic configuration 302 is illustrated in FIG. 8 by those components within the inner dashed line.
  • the computing device 300 can have additional features or functionality, and additional interfaces to facilitate communications between basic configuration 302 and any other devices and interfaces.
  • a bus/interface controller 330 can be used to facilitate communications between the basic configuration 302 and one or more data storage devices 332 via a storage interface bus 334 .
  • the data storage devices 332 can be removable storage devices 336 , non-removable storage devices 338 , or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDD), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSD), and tape drives to name a few.
  • HDD hard-disk drives
  • CD compact disk
  • DVD digital versatile disk
  • SSD solid state drives
  • Example computer storage media can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
  • the system memory 306 , removable storage devices 336 , and non-removable storage devices 338 are examples of computer readable storage media.
  • Computer readable storage media include, but not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed by computing device 300 . Any such computer readable storage media can be a part of computing device 300 .
  • the term “computer readable storage medium” excludes propagated signals and communication media.
  • the computing device 300 can also include an interface bus 340 for facilitating communication from various interface devices (e.g., output devices 342 , peripheral interfaces 344 , and communication devices 346 ) to the basic configuration 302 via bus/interface controller 330 .
  • Example output devices 342 include a graphics processing unit 348 and an audio processing unit 350 , which can be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 352 .
  • Example peripheral interfaces 344 include a serial interface controller 354 or a parallel interface controller 356 , which can be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 358 .
  • An example communication device 346 includes a network controller 360 , which can be arranged to facilitate communications with one or more other computing devices 362 over a network communication link via one or more communication ports 364 .
  • the network communication link can be one example of a communication media.
  • Communication media can typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media.
  • a “modulated data signal” can be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media can include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media.
  • RF radio frequency
  • IR infrared
  • the term computer readable media as used herein can include both storage media and communication media.
  • the computing device 300 can be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions.
  • a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions.
  • PDA personal data assistant
  • the computing device 300 can also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Techniques for limiting synchronization conflicts during file synchronization in a computing system are described herein. In one embodiment, a method includes detecting a change to a local copy a computer file on a client device. The local copy is associated with a local token. The method also includes obtaining a server token associated with a server copy of the same computer file on a file server and determining whether the local token matches the server token. If the local and server tokens match each other, the method includes uploading the local copy to the file server to overwrite the server copy even though the server copy contains a change to the computer file that is different than a change to the local copy of the same computer file.

Description

CROSS-REFERENCE TO RELATED APPLICATION(S)
This application is a non-provisional application of and claims priority to U.S. Provisional Application No. 62/407,166, filed on Oct. 12, 2016.
BACKGROUND
In computing, file servers are computers configured to provide shared storage of documents, sound files, photographs, movies, images, databases, or other suitable types of computer files over computer networks. File servers can facilitate multiple client devices to access the same computer files stored in an on-premises or remote repository. Users utilizing suitable client devices can retrieve, edit, save, or perform other suitable file operations on computer files while file servers track versions of the computer files, last edited date/time, users who edited and/or accessed the computer files, and/or other suitable information.
SUMMARY
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
File synchronization is a process of ensuring that computer files in two or more file locations are updated according to certain rules. In one-way file synchronization, updated files are copied from a source location (e.g., a hard drive) to one or more target locations (e.g., a cloud storage location). However, no files are copied back from the target locations to the source location. In two-way file synchronization, updated files are copied in both directions, usually with the purpose of maintaining identical copies at the all locations. In the description herein, the term “file synchronization” refers to two-way file synchronization.
One challenge of file synchronization is to limit occurrences of synchronization conflicts. A synchronization conflict exists when two copies of a single computer file contain different changes based on the same or different versions of the computer file. For example, a user can upload a computer file from a client device to a file server. In turn, the file server can store a server copy of the uploaded computer file on the file server or in a suitable storage location. During creation and/or file maintenance, the file server or other servers can insert various metadata (e.g., time of creation, uploaded by, priority, etc.) into the server copy based on certain metadata schema. Thus, the server copy can become “updated” and byte-wise different than a local copy of the computer file on the client device. If the user edits the local copy of the computer file without downloading the “updated” server copy, the edited local copy would contain changes different than those (i.e., the inserted metadata) in the server copy. Thus, a synchronization conflict would be triggered during file synchronization between the local and server copies of the computer file. Resolving such conflicts can be time consuming, costly, and can negatively impact user experience.
Several embodiments of the disclosed technology can limit occurrences of synchronization conflicts by implementing both a read validation token and a write validation token associated with copies of computer files. The read validation token can be updated when a copy of a computer file is modified in any way to be byte-wise different than an original copy. As such, when metadata is inserted into a server copy with an original read validation token, the “updated” server copy can be associated with a new read validation token. The write validation token is updated only when a copy of a computer file contains changes that are to be preserved. Such changes can include, for example, user edits or other changes a user performs on a computer file. When a copy of a computer file does not include preserved changes but instead those (e.g., machine modifications) that are re-appliable, the write validation token is maintained even when the copy is byte-wise modified. For example, metadata insertions can be machine modifications that are re-appliable and thus do not cause a write validation token to be updated.
In certain implementations, a file server can assign a read validation token and a write validation token to an uploaded computer file and notify the client device regarding the assigned read/write validation tokens. In other implementations, at least one of the read or write validation token can be generated and/or predicted based on a protocol followed by both a file server and client devices. For example, in one embodiment, the read or write validation token can include a hash (e.g., an XOR hash) of the computer file. In other embodiments, the read or write validation token can be generated utilizing discrete numbers, random numbers, or in other suitable fashions.
According to certain aspects of the disclosed technology, if a local copy is not modified and has a read validation token that is different than that of a server copy of the same computer file, the client device can determine that the server copy has been updated and download the server copy to overwrite the local copy. For example, during creation of the server copy and/or file maintenance, insertion of metadata can cause the server copy to have a read validation token different than that of the local copy because the server copy with the inserted metadata is byte-wise different than the local copy. As such, once the client device detects such a difference during file synchronization, the client device can download the server copy to overwrite the local copy on the client device, and thus achieving overall synchronization of the computer file.
According to additional aspects of the disclosed technology, if the local copy is modified on the client device but has a write validation token that is the same as that of the server copy, the client device can upload the modified local copy to overwrite the server copy even when a read validation token of the local copy is different than that of the server copy. For instance, during creation and/or file maintenance, insertion of the metadata into the server copy can cause the server copy to have an updated read validation token different than that of the local copy. However, the inserted metadata can be indicated as re-appliable machine modifications (e.g., by a workflow server) and thus does not cause the write validation token associated with the server copy to change. When the user edits the local copy on the client device, the edited local copy and the server copy can still have the same write validation token. As such, the client device can upload the edited local copy as a new server copy to overwrite the existing server copy with the previously inserted metadata. Subsequently, the metadata can be reapplied to the new server copy, and the client device can download the new server copy with the inserted metadata based on a difference of read validation token between the new server copy and the local copy to achieve synchronization of the computer file, as described above.
Several embodiments of the disclosed technology can limit occurrences of synchronization conflicts due to re-appliable machine modifications to computer files by file servers, workflow servers, or other suitable computing devices. Instead of indicating a synchronization conflict exists between a user-edited local copy and a server copy with machine modifications, several embodiments of the disclosed technology allow the server copy be overwritten by the user-edited local copy along with the machine modifications. The same or similar machine modifications can later be re-applied to the overwritten server copy. The client device can then download the overwritten server copy with the re-applied machine modifications when no more user edits exist in the local copy to achieve overall synchronization of the computer file.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram of a computer system implementing both read and write validation tokens in accordance with embodiments of the disclosed technology.
FIGS. 2A-2D are schematic diagrams illustrating certain hardware/software components of the computing system in FIG. 1 during certain stages of a file synchronization process.
FIGS. 3A-3D are schematic diagrams illustrating certain hardware/software components of the computing system in FIG. 1 during certain stages of another file synchronization process.
FIGS. 4A-4C are flowcharts illustrating various aspects of processes of file synchronization in accordance with embodiments of the disclosed technology.
FIG. 5 is a computing device suitable for certain components of the computing system in FIG. 1.
DETAILED DESCRIPTION
Certain embodiments of computing systems, devices, components, modules, routines, and processes for limiting synchronization conflicts during file synchronization are described below. In the following description, specific details of components are included to provide a thorough understanding of certain embodiments of the disclosed technology. A person skilled in the relevant art can also understand that the disclosed technology may have additional embodiments or may be practiced without several of the details of the embodiments described below with reference to FIGS. 1-5.
As used herein, the term “file synchronization” generally refers to a process of ensuring that copies of computer files in two or more file locations are updated in both directions according to certain rules. In one example, a new or updated copy of a computer file can be copied (e.g., uploaded) from a client device to a file server via a computer network, a direct wired/wireless connection, or other suitable communications channels. In another example, an updated copy of the same computer file can be copied (e.g., downloaded) from the file server to the client device via a suitable communications channel. A “synchronization conflict” can occur when copies of the same computer file include different changes based on the same or different versions of the computer file.
In certain file sharing computer systems, file servers or other types of servers can insert, add, append, or otherwise modify a user-uploaded computer file. For example, a client device can include a copy of a computer file (referred to as “local copy) to be uploaded to a file server. Once received, the file server can store the received copy of the computer file (referred to “server copy”) in a network storage location, a server hard drive, or other suitable storage locations. During creation and/or file maintenance of the server copy, various metadata (e.g., time of creation, uploaded by, priority, etc.) can be inserted into the server copy based on metadata schema of the file sharing system. As such, the server copy can become “updated,” i.e., containing new digital data, then the local copy on the client device. If the local copy is edited on the client device without downloading the “updated” server copy, the edited local copy can contain changes different than those (i.e., the inserted metadata) in the “updated” server copy, and thus causing a synchronization conflict. Resolving such conflicts can be time consuming, costly, and can negatively impact user experience.
Several embodiments of the disclosed technology can limit occurrences of the foregoing synchronization conflicts by implementing a write validation token associated with individual copies of computer files in addition to a read validation token. The read validation token can be updated when a server copy of a computer file is modified in any way to be byte-wise different than an original server copy. As such, when metadata is inserted into a server copy, the server copy with the inserted metadata can have an updated read validation token. The write validation token, on the other hand, can be maintained when a server copy of a computer file is modified but the modification is indicated as re-appliable. For example, the insertion of metadata or other suitable types of machine modifications can be indicated as re-appliable and thus do not cause a write validation token to be updated. Instead of indicating a synchronization conflict exists between a user-edited local copy and a server copy with machine modifications, the disclosed technology allows the file server to overwrite the server copy with the machine modifications with the user-edited local copy. Thus, certain synchronization conflicts due to re-appliable machine modifications can be avoided, as described in more detail below with reference to FIGS. 1-5.
FIG. 1 is a schematic diagram illustrating a file sharing computer system 100 implementing both read and write validation tokens in accordance with embodiments of the disclosed technology. As shown in FIG. 1, the computer system 100 can include a file server 106 and a workflow server 126 interconnected with one or more client devices 102 via a computer network 104. The individual client devices 102 are associated with corresponding users 101. The computer network 104 can include an enterprise intranet, a wide area network, a local area network, the Internet, or other suitable types of network.
Even though particular components and associated arrangements of the computer system 100 are shown in FIG. 1, in other embodiments, the computer system 100 can include additional and/or different components. For example, in the illustrated embodiment, the computer system 100 includes three client devices 102 corresponding to different users 101. In other embodiments, the computer system 100 can also include multiple client devices 102 associated with a single user 101. In further embodiments, the computer system 100 can also include additional file servers, web servers, domain name servers, workflow servers, network storage facilities, or other suitable components.
The client devices 102 can each include a computing device that facilitates corresponding users 101 to access to the file server 106 via the computer network 104. For example, in the illustrated embodiment, the client devices 102 individually include a desktop computer. In other embodiments, the client devices 102 can also include laptop computers, tablet computers, smartphones, or other suitable computing devices. Even though three users 101 are shown in FIG. 1 for illustration purposes, in other embodiments, the computer system 100 can facilitate any suitable number of users 101 to access file server 106 via the computer network 104.
The file server 106 can be configured to provide shared storage of documents, sound files, photographs, movies, images, databases, or other suitable types of computer files to the client devices 102 over the computer network 104. For example, users 101 utilizing corresponding client devices 102 can retrieve, edit, save, or perform other suitable file operations on computer files managed by the file server 106. The file server 106, in turn can track versions of computer files, last edited date/time, users who edited and/or accessed the computer files, and/or other suitable information associated with the computer files. In certain embodiments, the file server 106 can include one or more servers having suitable software applications to provide file synchronization for users of an enterprise, company, corporations, government entities, or other suitable organizations. In other embodiments, the file server 106 can also include one or more remote servers providing cloud-based storage services such as, for example, Google Drive®, Dropbox®, iCloud Backup®, etc.
In accordance with certain aspects of the disclosed technology, the file server 106 can be configured to implement both a read validation token and a write validation token associated with copies of computer files on the file server 106 in order to limit occurrences of synchronization conflicts due to machine modifications. A read validation token can indicate to a client device 102 that a server copy of a computer file has been updated on the file server 106. A write validation token can indicate to a client device 102 that the server copy has not been updated with data (e.g., machine modifications) that cannot be re-applied. In certain implementations, a read/write validation token can include an XOR hash value of a copy of a computer file. In other implementations, a read/write validation token can include numerical values, alphanumerical values, other types of hash values, or other suitable types of values. Example components and operations of the file server 106 and one of the client devices 102 are described in more detail below with reference to FIGS. 2A-2D.
The workflow server 126 can be configured to apply machine modifications to copies of computer files managed by the file server 106. In certain embodiments, the workflow server 126 can include a server configured to facilitate processing and/or management of the computer files by, for example, supplementing metadata according to certain metadata schema. In other embodiments, the workflow server 126 can be configured to perform other suitable operations related to storage, retrieval, and/or maintenance of the computer files. Though the workflow server 126 is shown in FIG. 1 as a component of the computer system 100, in other embodiments, the workflow server 126 can be external to the computer network 100. In further embodiments, the workflow server 126 can be omitted and associated operations performed by the file server 106.
FIGS. 2A-2D are schematic diagrams illustrating certain hardware/software components of the computer system 100 in FIG. 1 during certain stages of a file synchronization process. In FIGS. 2A-2D, certain components of the computer system 100 are omitted for clarity. For example, only one client device 102 is shown in FIGS. 2A-2D for illustration purposes. Other client devices 102 can have similar components and associated operations, as those described in more detail below with reference to FIGS. 2A-2D.
In addition, in FIGS. 2A-2D and in other Figures herein, individual software components, objects, classes, modules, and routines may be a computer program, procedure, or process written as source code in C, C++, C #, Java, and/or other suitable programming languages. A component may include, without limitation, one or more modules, objects, classes, routines, properties, processes, threads, executables, libraries, or other components. Components may be in source or binary form. Components may include aspects of source code before compilation (e.g., classes, properties, procedures, routines), compiled binary units (e.g., libraries, executables), or artifacts instantiated and used at runtime (e.g., objects, processes, threads). In certain embodiments, the various components and modules described below can be implemented with actors. In other embodiments, generation of the application and/or related services can also be implemented using monolithic applications, multi-tiered applications, or other suitable components.
Components within a system can take different forms within the system. As one example, a system comprising a first component, a second component and a third component can, without limitation, encompass a system that has the first component being a property in source code, the second component being a binary compiled library, and the third component being a thread created at runtime. The computer program, procedure, or process may be compiled into object, intermediate, or machine code and presented for execution by one or more processors of a personal computer, a network server, a laptop computer, a smartphone, and/or other suitable computing devices. Equally, components may include hardware circuitry.
A person of ordinary skill in the art would recognize that hardware may be considered fossilized software, and software may be considered liquefied hardware. As just one example, software instructions in a component may be burned to a Programmable Logic Array circuit, or may be designed as a hardware circuit with appropriate integrated circuits. Equally, hardware may be emulated by software. Various implementations of source, intermediate, and/or object code and associated data may be stored in a computer memory that includes read-only memory, random-access memory, magnetic disk storage media, optical storage media, flash memory devices, and/or other suitable computer readable storage media excluding propagated signals.
Though not shown in FIG. 2A, the client device 102 and the file server 106 can both include a processor operatively coupled to a memory containing instructions executable by the processor to provide certain software components. For example, as shown in FIG. 2A, the client device 102 can include a sync agent 108 interconnected to a sync folder 110. The sync agent 108 can be configured to perform synchronization state verification, file synchronization, file maintenance, or other suitable operations related to synchronization of computer files between the client device 102 and the file server 106. The sync folder 110 can be a file folder on the client device 102 designated to contain copies of computer files to be synchronized with corresponding copies on the file server 106. In certain embodiments, the sync folder 110 can be designated by default, for example, as related to a cloud-based storage. In other embodiments, the sync folder 110 can be manually designed by the user 101, or designated in other suitable fashions.
The file server 120 can include an interface component 122 and a sync controller 124 operatively coupled to a repository 121 for storing computer files. The interface component 122 can be configured to interact with the sync agent 108 on the client device 102 according to certain protocols. In certain embodiments, the interface component 122 can include an application programming interface configured to receive certain input and in response provide certain output to the client device 102. In other embodiments, the interface component 122 can also include a computer network interface or other suitable components.
The sync controller 124 can be configured to manage synchronization of copies of computer files in the repository 121. In certain embodiments, the sync controller 124 can be configured to implement a read validation token associated with each copy of the computer files. In other embodiments, the sync controller 124 can also be configured to implement a write validation token associated with each copy of the computer files to reduce certain synchronization conflicts between copies of computer files on the client device 102 and the repository 121, as described in more detail below with reference to FIGS. 2A-3D. In the following description, for ease of reference, a copy of a computer file in the sync folder 110 on the client device 102 is referred to as a “local copy” while a copy of the same computer file in the repository 121 is referred to as a “server copy.”
FIG. 2A illustrates a file synchronization stage in which the user 101 creates a local copy 112 a of a computer file 112 in the sync folder 110 via a file operation 103. For example, in certain embodiments, the user 101 can drag and drop the computer file 112 from another file folder (not shown) on the client device 102 into the sync folder 110. In other embodiments, the computer file 112 can be a newly created computer file. As shown in FIG. 2A, the local copy 112 a can include a stream of digital data referenced as by a stream number one for illustration purposes. In other embodiments, the stream of digital data can be referenced using hash values, random numbers, or in other suitable ways.
As shown in FIG. 2A, the sync agent 108 can detect the presence of the local copy 112 a of the computer file 112 and determine that synchronization of the computer file 112 is needed based on, for example, metadata associated with the computer file 112 that indicates a lack of synchronization (e.g., having an empty last synchronized date/time) of the computer file 112. In response, the sync agent 108 can be configured to transmit, via the computer network 104 (FIG. 1), a sync request 130 a to the file server 106. In certain embodiments, the sync request 130 a can include data representing certain information associated with the computer file 112. Such information can include, for example, file name, date/time created, authored by, file size, or other suitable information.
The interface component 122 can receive the sync request 130 a and provide the received sync request 130 a to the sync controller 124 for further processing. Upon receiving the sync request 130 a, the sync controller 124 can determine whether a corresponding server copy exists in the repository 121. In the illustrated embodiment of FIG. 2A, a corresponding server copy does not exist in the repository 121. As such, the file server 106 can provide a notification 131 a informing the client device 102 that a server copy does not exist on the file server 106. In other embodiments, if a server copy (not shown) already exists in the repository 121, for example, having been uploaded by another user 101, the notification 131 a can inform the client device 102 the existence of the server copy as well as associated read/write validation tokens associated with the server copy to the client device 102. The sync agent 108 can then determine whether to upload the local copy 112 a or download the server copy as described in more detail below with reference to FIGS. 2B-2C.
As shown in FIG. 2B, upon receiving the indication that a server copy of the computer file 112 does not exist in the repository 121, the client device 102 can upload the computer file 112 to the file server 106 via the computer network 104. Upon receiving the uploaded file 112, the sync controller 124 can store a server copy 112 a′ of the computer file 112 in the repository 121. The sync controller 124 can also be configured to associate the received computer file 112 and the server copy 112 a′ with a read validation token (shown as “RVT”) and a write validation token (shown as “WVT”). In certain embodiments, the sync controller 124 can provide the read/write tokens to the client device 102 as part of a sync report 132 a that indicates to the client device 102 that the upload has completed successfully and/or other suitable related information. In other embodiments, the client device 102 can predict the read/write validation tokens based on a protocol followed by both the client device 102 and the file server 106. As shown in FIG. 2B, the read/write validation tokens for both the local copy 112 a and the server copy 112 a′ of the computer file 112 are both assigned a value of one for illustration purposes. In other embodiments, the read/write validation tokens can have different hash values, random numbers, or other suitable values.
As shown in FIG. 2C, a workflow server 126 can be configured to apply machine modifications 128 to the server copy 112 a′ (FIG. 2B). In certain embodiments, the machine modifications 128 can include certain metadata supplemented to the server copy 112 a′ to generate an updated server copy 112 b′. In other embodiments, the machine modifications 128 can include other suitable machine applied changes to the server copy 112 a′. In further embodiments, administrative servers, database servers, or other suitable types of servers (not shown) can also apply machine modifications 128 to the server copy 112 a′.
During application of the machine modifications 128, the sync controller 124 can detect the application and, in response, update the read validation token. For example, as shown in FIG. 2C, the server copy 112 b′ can now have a read validation token value of two and a stream value of two due to the machine modifications 128. The sync controller 124 can also be configured to receive, for example, from programs executing on the workflow server 126, whether the applied machine modifications 128 are re-appliable. In certain embodiments, machine modifications 128 are re-appliable when such machine modifications 128 can be periodically applied if previous application is not detected. In other embodiments, machine modifications 128 are re-appliable when such machine modifications are repeatedly applied irrespective of previous applications. Upon receiving an indication that the applied machine modifications 128 are re-appliable, or not to be preserved, the sync controller 124 can maintain the write validation token, for example, at one in FIG. 2C while updating the read validation token to two.
During a subsequent synchronization cycle, the client device 102 can transmit another sync request 130 b and in response receive another notification 131 b from the file server 106, indicating that the server copy 112 b′ is now associated with a read validation token of two while the write validation token stays at one. In response to detecting a change of the read validation token and that the local copy 112 a has not been modified, the sync agent 108 can be configured to download the server copy 112 b′ from the file server 106 and overwrite the local copy 112 a, as shown in FIG. 2D. Upon completion of overwriting the local copy 112 a, both the local copy 112 b and the server copy 112 b′ have the same stream of digital data with the same read and write validation tokens.
The file synchronization operations shown in FIGS. 2C and 2D, however, can sometimes be interrupted when the user 101 edits the local copy 112 a before the server copy 112 b′ can be downloaded from the file server 106. For example, as shown in FIG. 3A, the user 101 can perform another file operation 103′ to the local copy 112 a (FIG. 2C) to generate an updated local copy 112 c. As such, the local copy 112 c can now have a stream number three different than the original local copy 112 a.
In certain embodiments, in response to detecting the updated local copy 112 c, the sync agent 108 can transmit another sync request 130 c to the file server 106 and receive in response, another notification 131 c indicating that the server copy 112 b′ is currently associated with a read validation token of two and a write validation token of one. In response to receiving the notification 131 c, the sync agent 108 can determine that even though the server copy 112 b′ contains changes only included in the local copy 112 c, such changes are deemed as re-appliable and thus can be overwritten because the write validation token associated with the local copy 112 c and that associated with the server copy 112 b′ match. As such, the sync agent 108 can upload the local copy 112 c to the file server 106 to overwrite the server copy 112 b′ along with the machine modifications 128 (FIG. 2C) previously applied. In other embodiments, the sync agent 108 can simply upload the edited local copy 112 c and the sync controller 124 can perform the foregoing operations to determine whether the server copy 112 b′ may be overwritten. As shown in FIG. 3B, the overwritten server copy 112 c′ now has a read validation token of three and a write validation token of 2, matching those of the local copy 112 c, respectively.
As shown in FIG. 3C, the workflow server 126 can then re-apply the machine modifications 128′ to the server copy 112 c′ to generate another updated server copy 112 d′. Because the machine modifications 128′ are re-appliable, the sync controller 124 can update the associated read validation token to four while maintaining the write validation token at 2. Subsequently, the client device 102 can download the server copy 112 d′ from the file server 106 when the user 101 does not edit the local copy 112 c. As shown in FIG. 3D, the local copy 112 c (FIG. 3C) can then be overwritten with the server copy 112 d′ to achieve synchronization between the local copy 112 d and the server copy 112 d′.
Several embodiments of the disclosed technology can thus limit occurrences of synchronization conflicts caused by machine modifications by implementing both a read validation token and a write validation token associated with individual copies of computer files in addition to a read validation token. The read validation token can be updated when a server copy of a computer file is modified in any way to be byte-wise different than an original server copy. As such, when machine modifications are applied to a server copy, the modified server copy can have an updated read validation token. The write validation token, on the other hand, can be maintained when the server copy is modified but the machine modifications are indicated as re-appliable. Thus, instead of indicating a synchronization conflict exists between a user-edited local copy and a server copy with machine modifications, the disclosed technology allows the file server 106 to overwrite the server copy with the user-edited local copy. Thus, certain synchronization conflicts due to re-appliable machine modifications can be avoided.
FIGS. 4A-4C are flowcharts illustrating processes of file synchronization in accordance with embodiments of the disclosed technology. Even though the processes are described below with reference to the computer system 100 of FIG. 1, in other embodiments, the processes can also be applied in other computer systems with similar or different components.
FIG. 4A is a flowchart illustrating a process 200 of file synchronization when a local copy is modified in accordance with embodiments of the disclosed technology. As shown in FIG. 4A, the process 200 can include detecting a change in a local copy of a computer file at stage 202. In one embodiment, the detected change can include a user edit to the computer file. In another embodiment, the detected change can include a user creating the computer file. In other embodiments, the detected change can include other suitable user operations that create and/or modify the computer file.
The process 200 can then include obtaining state information of a corresponding server copy of the computer file at stage 204. In certain embodiments, the state information includes an existence or non-existence of a server copy of the computer file in, for example, the repository 121 of FIG. 2A. In other embodiments, the state information can also include a current read validation token and a current write validation token of a server copy in the repository 121. In further embodiments, the state information can also include last modified by, last modification date/time, or other suitable information related to the server copy.
The process 200 can then include a decision stage 205 to determine whether the write validation token of the changed local copy matches that of the server copy. In response to determining that the write validation tokens match, the process 200 can include uploading the changed local copy to overwrite the server copy in the repository 121, irrespective of whether the read validation tokens match, at stage 206. In response to determining that the write validation tokens do not match, the process 200 can include indicating a synchronization conflict at stage 208. The process 200 can also further include requesting user intervention for resolving the synchronization conflict and/or perform other suitable operations to resolve the synchronization conflict.
FIG. 4B is a flowchart illustrating a process 210 of file synchronization when a local copy is not modified in accordance with embodiments of the disclosed technology. As shown in FIG. 4B, the process 210 can include obtaining state information of a corresponding server copy at stage 204′, generally similar to stage 204 described above with reference to FIG. 4A. The process 210 can then include a decision stage 211 to determine whether a read validation token of the local copy matches that of the server copy. In response to determining that the read validation token of the local copy matches that of the server copy, the process 210 can include indicating that file synchronization of the computer file is complete at stage 214. In response to determining that the read validation token of the local copy does not match that of the server copy, the process 210 can include downloading the server copy to overwrite the local copy at stage 212 before indicating that file synchronization of the computer file is complete at stage 214.
FIG. 4C is a flowchart illustrating a process 220 of managing a server copy on a file server in accordance with embodiments of the disclosed technology. As shown in FIG. 4C, the process 220 can include receiving changes to a server copy at stage 222. The process 220 can then include a decision stage 224 to determine whether the received changes are re-appliable. In certain embodiments, the changes are re-appliable when the changes are machine modifications that can be repeatedly applied. In other embodiments, the changes can be re-appliable based on other suitable criteria. In response to determining that the changes are re-appliable, the process 220 can include updating a read validation token associated with the server copy without updating a write validation token associated with the same server copy. In response to determining that the changes are not re-appliable, the process 220 can include updating both the read validation token and the write validation token associated with the server copy.
FIG. 5 is a computing device 300 suitable for certain components of the computer system 100 in FIG. 1. For example, the computing device 300 can be suitable for the file server 106, the workflow server 126, or the client devices 102 of FIG. 1. In a very basic configuration 302, the computing device 300 can include one or more processors 304 and a system memory 306. A memory bus 308 can be used for communicating between processor 304 and system memory 306.
Depending on the desired configuration, the processor 304 can be of any type including but not limited to a microprocessor (μP), a microcontroller (μC), a digital signal processor (DSP), or any combination thereof. The processor 304 can include one more levels of caching, such as a level-one cache 310 and a level-two cache 312, a processor core 314, and registers 316. An example processor core 314 can include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof. An example memory controller 318 can also be used with processor 304, or in some implementations, memory controller 318 can be an internal part of processor 304.
Depending on the desired configuration, the system memory 306 can be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. The system memory 306 can include an operating system 320, one or more applications 322, and program data 324. This described basic configuration 302 is illustrated in FIG. 8 by those components within the inner dashed line.
The computing device 300 can have additional features or functionality, and additional interfaces to facilitate communications between basic configuration 302 and any other devices and interfaces. For example, a bus/interface controller 330 can be used to facilitate communications between the basic configuration 302 and one or more data storage devices 332 via a storage interface bus 334. The data storage devices 332 can be removable storage devices 336, non-removable storage devices 338, or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDD), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSD), and tape drives to name a few. Example computer storage media can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. The term “computer readable storage media” or “computer readable storage device” excludes propagated signals and communication media.
The system memory 306, removable storage devices 336, and non-removable storage devices 338 are examples of computer readable storage media. Computer readable storage media include, but not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed by computing device 300. Any such computer readable storage media can be a part of computing device 300. The term “computer readable storage medium” excludes propagated signals and communication media.
The computing device 300 can also include an interface bus 340 for facilitating communication from various interface devices (e.g., output devices 342, peripheral interfaces 344, and communication devices 346) to the basic configuration 302 via bus/interface controller 330. Example output devices 342 include a graphics processing unit 348 and an audio processing unit 350, which can be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 352. Example peripheral interfaces 344 include a serial interface controller 354 or a parallel interface controller 356, which can be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 358. An example communication device 346 includes a network controller 360, which can be arranged to facilitate communications with one or more other computing devices 362 over a network communication link via one or more communication ports 364.
The network communication link can be one example of a communication media. Communication media can typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. A “modulated data signal” can be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media can include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media. The term computer readable media as used herein can include both storage media and communication media.
The computing device 300 can be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions. The computing device 300 can also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.
From the foregoing, it will be appreciated that specific embodiments of the disclosure have been described herein for purposes of illustration, but that various modifications may be made without deviating from the disclosure. In addition, many of the elements of one embodiment may be combined with other embodiments in addition to or in lieu of the elements of the other embodiments. Accordingly, the technology is not limited except as by the appended claims.

Claims (18)

We claim:
1. A method of facilitating file synchronization between a client device and a file server via a computer network, the method comprising:
detecting a change to a local copy of a version of a computer file on the client device, the original local copy being associated with a local token;
obtaining, via the computer network, data regarding a server token associated with a server copy of the same computer file on the file server, the server copy containing another change to the same version of the computer file, wherein the another change is different than the detected change to the local copy;
determining whether the local token associated with the local copy matches the server token associated with the server copy;
in response to determining that the local and server tokens do not match each other, indicating a synchronization conflict is present between the local copy having the detected change and the server copy having the another change; and
in response to determining that the local and server tokens match each other, uploading, via the computer network, the local copy having the detected change from the client device to the file server to overwrite the server copy even though the server copy contains the another change to the version of the computer file that is different than the detected change to the local copy of the same version of the computer file, thereby limiting occurrences of synchronization conflicts between the local copy and the server copy of the computer file.
2. The method of claim 1 wherein detecting the change to the local copy includes detecting a file operation performed by a user on the local copy of the version of the computer file.
3. The method of claim 1 wherein subsequent to uploading the local copy having the detected change, receiving, via the computer network, information indicating an updated value for the local token.
4. The method of claim 1 wherein:
the another change to the version of the computer file includes metadata inserted to the version of the computer file; and
uploading the local copy includes uploading the local copy having the detected change from the client device to the file server to overwrite the server copy along with the inserted metadata.
5. The method of claim 1 wherein:
the local token is a local write validation token and the server token is a local write validation token;
the local copy is also associated with a local read validation token and the server copy is also associated with a server read validation token that is different than the local read validation token; and
uploading the local copy includes uploading the local copy having the detected change from the client device to the file server to overwrite the server copy irrespective to whether the local read validation token matches the server read validation token.
6. The method of claim 1 wherein the local token and the server token individually includes a hash value of the local copy and the server copy, respectively.
7. The method of claim 1 wherein:
the local token is a local write validation token and the server token is a local write validation token;
the local copy is also associated with a local read validation token and the server copy is also associated with a server read validation token that is different than the local read validation token; and
subsequent to overwriting the server copy with the local copy having the detected change,
detecting that the local read validation token is different than the server read validation token; and
in response to detecting that the local read validation token is different than the server read validation token, downloading, via the computer network, the server copy to overwrite the local copy when a further change to the local copy is absent.
8. A computing device interconnected to a file server via a computer network, the computing device comprising:
a processor; and
a memory containing a local copy of a version of a computer file having a user update, the local copy being associated with a local token, wherein the memory also contains instructions executable by the processor to cause the processor to perform a process comprising:
receiving, via the computer network, data regarding a server token associated with a server copy of the same computer file on the file server, the server copy containing a change to the same version of the computer file that is different than the user update to the local copy;
when the local and server tokens do not match each other, indicate a synchronization conflict is present between the local copy having the user update and the server copy having the change; and
when the local and server tokens match each other, uploading, via the computer network, the local copy having the user update from the client device to the file server to overwrite the server copy even though the server copy contains the change that is different than the user update to the local copy of the same version of the computer file, thereby avoiding declaring a synchronization conflict between the local copy with the user update and the server copy with the change that is different than the user update.
9. The computing device of claim 8 wherein the user update to the local copy includes a file operation performed by a user on the local copy of the version of the computer file.
10. The computing device of claim 8 wherein subsequent to uploading the local copy having the user update, updating a value of the local token corresponding to the local copy having the user update.
11. The computing device of claim 8 wherein:
the change contained in the server copy includes metadata inserted to the version of the computer file according to a metadata schema associated with the file server; and
uploading the local copy includes uploading the local copy having the user update to the file server to overwrite the server copy along with the inserted metadata.
12. The computing device of claim 8 wherein:
the local token is a local write validation token and the server token is a local write validation token;
the local copy is also associated with a local read validation token and the server copy is also associated with a server read validation token that is different than the local read validation token; and
uploading the local copy includes uploading the local copy having the user update from the client device to the file server to overwrite the server copy irrespective to whether the local read validation token matches the server read validation token.
13. The computing device of claim 8 wherein:
the change contained in the server copy includes another user update to the version of the computer file from another user; and
the process performed by the processor further includes when the local and server tokens do not match each other, indicating a synchronization conflict is present between the local copy having the user update and the server copy having the another user update.
14. The computing device of claim 8 wherein the local token and the server token individually includes a hash value of the local copy and the server copy of the computer file, respectively.
15. The computing device of claim 8 wherein:
the local token is a local write validation token and the server token is a local write validation token;
the local copy is also associated with a local read validation token and the server copy is also associated with a server read validation token that is different than the local read validation token; and
when the local and server write validation tokens match each other and the local and server read validation tokens differ from each other, downloading, via the computer network, the server copy to overwrite the local copy.
16. A computing device interconnected with multiple client devices via a computer network, the computing device comprising:
a processor; and
a memory containing instructions executable by the processor to cause the processor to perform a process comprising:
detecting a change to a server copy of a computer file previously synchronized with a corresponding local copy of the computer file on a client device, wherein:
the local copy is associated with a local read validation token and a local write validation token; and
the server copy is associated with a server read validation token and a server write validation token match the local read validation token and the local write validation token, respectively;
determining whether the detected change is re-appliable to the server copy;
in response to determining that the detected change is not re-appliable to the server copy, updating both the server read validation token and the server write validation token such that both the server read validation token and the server write validation token are different than the local read validation token and the local write validation token, respectively; and
in response to determining that the detected change is re-appliable to the server copy,
updating the server read validation token while maintaining the write validation token despite the detected change such that the server read validation token differs from the local read validation token while the server write validation token matches the local write validation token of the local copy; and
notifying, via the computer network, the client device regarding the updated read validation token.
17. The computing device of claim 16 wherein detecting the change to the server copy includes detecting insertion of metadata insertion into the server copy of the computer file.
18. The computing device of claim 16 wherein:
detecting the change to the server copy includes detecting insertion of metadata insertion into the server copy of the computer file; and
determining whether the detected change is re-appliable to the server copy includes receiving an indication from an application inserting the metadata into the server copy whether the inserted metadata is re-appliable.
US15/405,553 2016-10-12 2017-01-13 File synchronization with reduced conflicts in computing systems Active 2037-11-27 US10740298B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US15/405,553 US10740298B2 (en) 2016-10-12 2017-01-13 File synchronization with reduced conflicts in computing systems
CN201780062898.7A CN109804361B (en) 2016-10-12 2017-10-06 File synchronization in a computing system
EP17784819.9A EP3526691B1 (en) 2016-10-12 2017-10-06 File synchronization in computing systems
PCT/US2017/055452 WO2018071276A1 (en) 2016-10-12 2017-10-06 File synchronization in computing systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662407166P 2016-10-12 2016-10-12
US15/405,553 US10740298B2 (en) 2016-10-12 2017-01-13 File synchronization with reduced conflicts in computing systems

Publications (2)

Publication Number Publication Date
US20180101544A1 US20180101544A1 (en) 2018-04-12
US10740298B2 true US10740298B2 (en) 2020-08-11

Family

ID=61829656

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/405,553 Active 2037-11-27 US10740298B2 (en) 2016-10-12 2017-01-13 File synchronization with reduced conflicts in computing systems

Country Status (4)

Country Link
US (1) US10740298B2 (en)
EP (1) EP3526691B1 (en)
CN (1) CN109804361B (en)
WO (1) WO2018071276A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210208571A1 (en) * 2020-01-06 2021-07-08 Rockwell Automation Technologies, Inc. Industrial data services platform
US11227080B2 (en) 2017-04-17 2022-01-18 Rockwell Automation Technologies, Inc. Industrial automation information contextualization method and system
US11340591B2 (en) 2017-06-08 2022-05-24 Rockwell Automation Technologies, Inc. Predictive maintenance and process supervision using a scalable industrial analytics platform
US11403541B2 (en) 2019-02-14 2022-08-02 Rockwell Automation Technologies, Inc. AI extensions and intelligent model validation for an industrial digital twin
US11435726B2 (en) 2019-09-30 2022-09-06 Rockwell Automation Technologies, Inc. Contextualization of industrial data at the device level
US11726459B2 (en) 2020-06-18 2023-08-15 Rockwell Automation Technologies, Inc. Industrial automation control program generation from computer-aided design
US11774946B2 (en) 2019-04-15 2023-10-03 Rockwell Automation Technologies, Inc. Smart gateway platform for industrial internet of things
US11841699B2 (en) 2019-09-30 2023-12-12 Rockwell Automation Technologies, Inc. Artificial intelligence channel for industrial automation

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327574B (en) * 2018-12-14 2022-05-06 英业达科技有限公司 Single machine login system allowing network address change and method thereof
CN113168496A (en) * 2018-12-24 2021-07-23 深圳市柔宇科技股份有限公司 Note synchronization method, system and related device
US11226983B2 (en) * 2019-06-18 2022-01-18 Microsoft Technology Licensing, Llc Sub-scope synchronization
CN110737722B (en) * 2019-09-29 2022-07-05 国网福建省电力有限公司检修分公司 Substation monitoring background database, SCD and RCD synchronization system and method
US20230195579A1 (en) * 2021-12-16 2023-06-22 Elasticsearch B.V. Peer Recovery From Remote Storage

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151708A (en) 1997-12-19 2000-11-21 Microsoft Corporation Determining program update availability via set intersection over a sub-optical pathway
US20050210079A1 (en) * 2004-03-17 2005-09-22 Edlund Stefan B Method for synchronizing documents for disconnected operation
US20070283011A1 (en) 2006-06-02 2007-12-06 Google Inc. Synchronizing Configuration Information Among Multiple Clients
US20080140732A1 (en) 2006-12-11 2008-06-12 Bentley System, Inc. Method and system for sharing file based data
US20090228509A1 (en) 2008-03-04 2009-09-10 Apple Inc. Synchronization server process
US8082316B2 (en) 2006-06-02 2011-12-20 Google Inc. Resolving conflicts while synchronizing configuration information among multiple clients
US20120233293A1 (en) 2011-03-08 2012-09-13 Rackspace Us, Inc. Parallel Upload and Download of Large Files Using Bittorrent
US20130006947A1 (en) * 2011-07-03 2013-01-03 Microsoft Corporation Conflict resolution via metadata examination
US20130103651A1 (en) 2011-10-23 2013-04-25 Microsoft Corporation Telemetry file hash and conflict detection
CN103248711A (en) 2013-05-23 2013-08-14 华为技术有限公司 File uploading method and server
US20140006352A1 (en) 2012-06-27 2014-01-02 Dropbox, Inc. Determining a preferred modified version from among multiple modified versions for synchronized files
US8806656B2 (en) 2011-02-18 2014-08-12 Xerox Corporation Method and system for secure and selective access for editing and aggregation of electronic documents in a distributed environment
US8862561B1 (en) 2012-08-30 2014-10-14 Google Inc. Detecting read/write conflicts
US20150186668A1 (en) 2013-12-30 2015-07-02 Moka5, Inc. Protecting data in insecure cloud storage
US9268655B2 (en) 2012-10-02 2016-02-23 Nextbit Systems Inc. Interface for resolving synchronization conflicts of application states
US20160098469A1 (en) * 2014-10-07 2016-04-07 Yahoo! Inc. Method and system for providing a synchronization service
US20160210202A1 (en) * 2015-01-20 2016-07-21 Commvault Systems, Inc. Synchronizing selected portions of data in a storage management system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2152528C (en) * 1994-07-29 2000-04-18 Chung-Hwa Herman Rao Distributed systems with replicated files
US8239345B2 (en) * 2007-12-27 2012-08-07 Microsoft Corporation Asynchronous replication
CN101783731B (en) * 2009-12-28 2012-05-23 飞天诚信科技股份有限公司 Display method of dynamic password and dynamic token
US20130041985A1 (en) * 2011-08-10 2013-02-14 Microsoft Corporation Token based file operations

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151708A (en) 1997-12-19 2000-11-21 Microsoft Corporation Determining program update availability via set intersection over a sub-optical pathway
US20050210079A1 (en) * 2004-03-17 2005-09-22 Edlund Stefan B Method for synchronizing documents for disconnected operation
US20070283011A1 (en) 2006-06-02 2007-12-06 Google Inc. Synchronizing Configuration Information Among Multiple Clients
US8082316B2 (en) 2006-06-02 2011-12-20 Google Inc. Resolving conflicts while synchronizing configuration information among multiple clients
US20080140732A1 (en) 2006-12-11 2008-06-12 Bentley System, Inc. Method and system for sharing file based data
US20090228509A1 (en) 2008-03-04 2009-09-10 Apple Inc. Synchronization server process
US8806656B2 (en) 2011-02-18 2014-08-12 Xerox Corporation Method and system for secure and selective access for editing and aggregation of electronic documents in a distributed environment
US20120233293A1 (en) 2011-03-08 2012-09-13 Rackspace Us, Inc. Parallel Upload and Download of Large Files Using Bittorrent
US20130006947A1 (en) * 2011-07-03 2013-01-03 Microsoft Corporation Conflict resolution via metadata examination
US20130103651A1 (en) 2011-10-23 2013-04-25 Microsoft Corporation Telemetry file hash and conflict detection
US20140006352A1 (en) 2012-06-27 2014-01-02 Dropbox, Inc. Determining a preferred modified version from among multiple modified versions for synchronized files
US8862561B1 (en) 2012-08-30 2014-10-14 Google Inc. Detecting read/write conflicts
US9268655B2 (en) 2012-10-02 2016-02-23 Nextbit Systems Inc. Interface for resolving synchronization conflicts of application states
CN103248711A (en) 2013-05-23 2013-08-14 华为技术有限公司 File uploading method and server
US20150186668A1 (en) 2013-12-30 2015-07-02 Moka5, Inc. Protecting data in insecure cloud storage
US20160098469A1 (en) * 2014-10-07 2016-04-07 Yahoo! Inc. Method and system for providing a synchronization service
US20160210202A1 (en) * 2015-01-20 2016-07-21 Commvault Systems, Inc. Synchronizing selected portions of data in a storage management system
US9588849B2 (en) * 2015-01-20 2017-03-07 Commvault Systems, Inc. Synchronizing selected portions of data in a storage management system
US20170131912A1 (en) * 2015-01-20 2017-05-11 Commvault Systems, Inc. Synchronizing selected portions of data in a storage management system
US9928005B2 (en) * 2015-01-20 2018-03-27 Commvault Systems, Inc. Synchronizing selected portions of data in a storage management system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"Hashes and ETags: Best Practices", Retrieved on: Dec. 28, 2014 Available at: https://cloud.google.com/storage/docs/hashes-etags.
"International Search Report and Written Opinion Issued in PCT Application No. PCT/US2017/055452", dated Dec. 6, 2017, 11 Pages.
Feldman, et al., "SPORC: Group Collaboration using Untrusted Cloud Resources", In Proceedings of the 9th USENIX conference on Operating systems design and implementation, Oct. 4, 2010, 14 pages.
Fielding, et al., "Hypertext Transfer Protocol-HTTP/1.1", Published on: Jun. 1999 Available at: https://www.ietf.org/rfc/rfc2616.txt.
Fielding, et al., "Hypertext Transfer Protocol—HTTP/1.1", Published on: Jun. 1999 Available at: https://www.ietf.org/rfc/rfc2616.txt.

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11227080B2 (en) 2017-04-17 2022-01-18 Rockwell Automation Technologies, Inc. Industrial automation information contextualization method and system
US12019429B2 (en) 2017-06-08 2024-06-25 Rockwell Automation Technologies, Inc. Scalable industrial analytics platform
US11340591B2 (en) 2017-06-08 2022-05-24 Rockwell Automation Technologies, Inc. Predictive maintenance and process supervision using a scalable industrial analytics platform
US11900277B2 (en) 2019-02-14 2024-02-13 Rockwell Automation Technologies, Inc. AI extensions and intelligent model validation for an industrial digital twin
US11403541B2 (en) 2019-02-14 2022-08-02 Rockwell Automation Technologies, Inc. AI extensions and intelligent model validation for an industrial digital twin
US11774946B2 (en) 2019-04-15 2023-10-03 Rockwell Automation Technologies, Inc. Smart gateway platform for industrial internet of things
US11709481B2 (en) 2019-09-30 2023-07-25 Rockwell Automation Technologies, Inc. Contextualization of industrial data at the device level
US11841699B2 (en) 2019-09-30 2023-12-12 Rockwell Automation Technologies, Inc. Artificial intelligence channel for industrial automation
US11435726B2 (en) 2019-09-30 2022-09-06 Rockwell Automation Technologies, Inc. Contextualization of industrial data at the device level
US11733683B2 (en) 2020-01-06 2023-08-22 Rockwell Automation Technologies, Inc. Industrial data services platform
US20210208571A1 (en) * 2020-01-06 2021-07-08 Rockwell Automation Technologies, Inc. Industrial data services platform
US11249462B2 (en) * 2020-01-06 2022-02-15 Rockwell Automation Technologies, Inc. Industrial data services platform
US11726459B2 (en) 2020-06-18 2023-08-15 Rockwell Automation Technologies, Inc. Industrial automation control program generation from computer-aided design

Also Published As

Publication number Publication date
CN109804361B (en) 2023-06-20
US20180101544A1 (en) 2018-04-12
CN109804361A (en) 2019-05-24
EP3526691A1 (en) 2019-08-21
EP3526691B1 (en) 2023-08-23
WO2018071276A1 (en) 2018-04-19

Similar Documents

Publication Publication Date Title
US10740298B2 (en) File synchronization with reduced conflicts in computing systems
US11782949B2 (en) Violation resolution in client synchronization
US11455278B2 (en) Workflow functions of content management system enforced by client device
US10140467B1 (en) Workflow functions of content management system enforced by client device
US9398090B2 (en) Synchronized content library
US20110191304A1 (en) System and method for export and import of metadata located in metadata registries
US11811851B2 (en) Method and system for enforcing governance across multiple content repositories using a content broker
US10970193B2 (en) Debugging a client synchronization service
US20190258621A1 (en) Method and system for using external content type object types

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WATSON, ANDREW SEAN;RAYSON, STEVE;DEDEOGLU, YIGITHAN;AND OTHERS;SIGNING DATES FROM 20161012 TO 20170113;REEL/FRAME:042663/0156

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4